Asynchronous Weak Secret Sharing Sample Clauses

Asynchronous Weak Secret Sharing. (AWSS) An AWSS protocol consists of two sub-protocols: a sharing protocol (WSh), where the dealer shares a secret and a re- construction protocol (WRec), where the parties reconstruct the shared secret. The Termination and the Secrecy condi- tions of AVSS (see Definition 2) remain the same for AWSS, except that Sh is replaced by WSh and Rec is replaced by WRec. The Correctness condition of AVSS also remains the same for AWSS for the case when D is honest; however, the Correctness condition is “weakened” in AWSS for the case when D is corrupted as follows: If an honest party terminates WSh then a value, say Definition 3 (Asynchronous Weak Commitment (AWC)) Let (Com, Decom) be a pair of protocols for the n parties, where a Committer has a private input s F for Com (the secret to be committed). In the protocol Decom, Committer has a private input sy (the secret to be decommit- xxx)10 and all the parties upon terminating Decom either out- put sy or . Then (Com, Decom) is a (1 s)-AWC scheme, for an allowed error parameter s (where s > 0), if the fol- lowing requirements hold for every possible Adv: − ⊥ −
AutoNDA by SimpleDocs
Asynchronous Weak Secret Sharing. (AWSS) Like AVSS, an AWSS protocol also consists of two pro- tocols: a sharing protocol (called WSh), where the dealer shares a secret and a reconstruction protocol (called WRec), where the parties reconstruct the secret from its shares. An AWSS protocol also has three properties, namely Termina- tion, Correctness and Secrecy. The Termination and the Secrecy conditions are the same as for the AVSS (see Def- inition 2), except that Sh is replaced by WSh and Rec is replaced by WRec. The Correctness condition is also the same as for the AVSS for the case when the dealer is honest; however, the Correctness condition is weakened in AWSS for the case when the dealer is corrupted as follows: If an honest party terminates WSh then a value, say s ∈ F ∪ {⊥} is fixed. Moreover, with probability at least (1 − s), each honest party will output either s or ⊥ at the end10 of WRec.

Related to Asynchronous Weak Secret Sharing

  • Career Ladder Effective July 1, 2014, TALC and the District agreed to the 11 implementation of a Career Ladder for the advancement of instructional staff on the 12 Performance Salary Schedule. Elements of the Career Ladder are outlined and posted on 13 the District website and include detailed descriptions of Career Ladder levels and the 14 requirements for movement. All instructional staff hired on or after January 8, 2018 will 15 be placed on the Apprentice level of the Career Ladder.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • Tandem Switched Transport 7.3.4.2.1 For traffic delivered through a CenturyLink or CLEC tandem Switch (as defined in the Agreement), the Parties agree that, because this State is a new market for CLEC, tandem switched transport functions for Exchange Service (EAS/Local) non-transit traffic shall be compensated based upon the xxxx and keep compensation mechanism. Xxxx and keep will apply to both the tandem switching rate and the tandem transmission rate. Xxxx and keep shall govern compensation for such traffic exchanged by the Parties in this State until the earlier of: (1) the expiration of the Agreement, or (2) further action by the Federal Communications Commission (FCC), or a court of competent jurisdiction, vacates, replaces, modifies, or supersedes the applicable rules adopted in Order on Remand and Report and Order, CC Docket Nos. 96-98, 00-00, XXX 00-000 (xxx. Apr. 27, 2001). 7.3.4.2.2 Intentionally Left Blank.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Volunteer Firefighting Leave Leave without pay will be granted when an employee who is a volunteer firefighter is called to duty to respond to a fire, natural disaster or medical emergency.

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Fish and Wildlife Service 2002c. Colorado pikeminnow (Ptychocheilus lucius) recovery goals: amendment and supplement to the Colorado Squawfish Recovery Plan.

  • Local Switching Interfaces 4.2.13.1 Newcomm shall order ports and associated interfaces compatible with the services it wishes to provide as listed in Exhibit A. BellSouth shall provide the following local switching interfaces:

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.